This Article 
   
 Share 
   
 Bibliographic References 
   
 Add to: 
 
Digg
Furl
Spurl
Blink
Simpy
Google
Del.icio.us
Y!MyWeb
 
 Search 
   
Unicode Steganographic Exploits: Maintaining Enterprise Border Security
September/October 2007 (vol. 5 no. 5)
pp. 32-39
Frank J. Mabry, US Military Academy, West Point
John R. James, US Military Academy, West Point
Aaron J. Ferguson, US Military Academy, West Point
Unicode is rapidly becoming the preferred means for representing symbols used in creating multimedia content, especially for information that's presented in multiple languages. A vulnerability in unicode leaves such content susceptible to being used for the creation of covert channel communications.

1. R.E. Gomory, "The Known, the Unknown and the Unknowable," Scientific Am., vol. 272, no. 6, 1995, p. 120.
1. R.E. Gomory, "The Known, the Unknown and the Unknowable," Scientific Am., vol. 272, no. 6, 1995, p. 120.
1. R.E. Gomory, "The Known, the Unknown and the Unknowable," Scientific Am., vol. 272, no. 6, 1995, p. 120.
2. "Requirements for String Identity Matching and String Indexing," W3C working draft, 10 July 1998; www.w3.org/TR/1998WD-charreq-19980710.
2. "Requirements for String Identity Matching and String Indexing," W3C working draft, 10 July 1998; www.w3.org/TR/1998WD-charreq-19980710.
2. "Requirements for String Identity Matching and String Indexing," W3C working draft, 10 July 1998; www.w3.org/TR/1998WD-charreq-19980710.
3. N.F. Johnson and S. Jajodia, "Steganography: Seeing the Unseen," Computer, vol. 31, no. 2, 1998, pp. 26–34.
3. N.F. Johnson and S. Jajodia, "Steganography: Seeing the Unseen," Computer, vol. 31, no. 2, 1998, pp. 26–34.
3. N.F. Johnson and S. Jajodia, "Steganography: Seeing the Unseen," Computer, vol. 31, no. 2, 1998, pp. 26–34.
4. W.J. Meador, "Steganography: The Last Digital Hiding Place," The ISSA J., Oct. 2005, p. 11.
4. W.J. Meador, "Steganography: The Last Digital Hiding Place," The ISSA J., Oct. 2005, p. 11.
4. W.J. Meador, "Steganography: The Last Digital Hiding Place," The ISSA J., Oct. 2005, p. 11.
5. R.J. Anderson and F.A.P. Petitcolas, "On the Limits of Steganography," IEEE J. Selected Areas in Comm., vol. 16, no. 4, 1998, pp. 474–481.
5. R.J. Anderson and F.A.P. Petitcolas, "On the Limits of Steganography," IEEE J. Selected Areas in Comm., vol. 16, no. 4, 1998, pp. 474–481.
5. R.J. Anderson and F.A.P. Petitcolas, "On the Limits of Steganography," IEEE J. Selected Areas in Comm., vol. 16, no. 4, 1998, pp. 474–481.
6. P. Moulin and J.A. O'Sullivan, "Information-Theoretic Analysis of Information Hiding," IEEE Trans. Information Theory, vol. 49, Mar. 2003, pp. 563–593.
6. P. Moulin and J.A. O'Sullivan, "Information-Theoretic Analysis of Information Hiding," IEEE Trans. Information Theory, vol. 49, Mar. 2003, pp. 563–593.
6. P. Moulin and J.A. O'Sullivan, "Information-Theoretic Analysis of Information Hiding," IEEE Trans. Information Theory, vol. 49, Mar. 2003, pp. 563–593.

Index Terms:
information assurance, network security experiment, steganography, education, steganographics
Citation:
Frank J. Mabry, John R. James, Aaron J. Ferguson, "Unicode Steganographic Exploits: Maintaining Enterprise Border Security," IEEE Security & Privacy, vol. 5, no. 5, pp. 32-39, Sept.-Oct. 2007, doi:10.1109/MSP.2007.128
Usage of this product signifies your acceptance of the Terms of Use.